29. Jim has been contracted to perform a penetration test of a bank’s primary branch. In order to make the test as real as possible, he has not been given any information about the bank other than its name and address. What type of penetration test has Jim agreed to perform?
18. Which of the following is not a potential problem with active wireless scanning?
28. What major issue often results from decentralized access control?
27. What type of attack can be prevented by using a trusted path?
26. Which of the following items are not commonly associated with restricted interfaces?